Norway blames China-linked APT31 for 2018 government hack
Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s IT network....
Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s IT network....
A new bug in iPhone can permanently break users’ WiFi by disabling it, the issue could be triggered by simply...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
FalconEye is a windows endpoint detection software for real-time process injections. It is a kernel-mode driver that aims to catch...
AboutRustcat is a port listener that can be used for different purposes. It is basically like netcat but with fewer...
North Korea-linked APT group Kimsuky allegedly breached South Korea’s atomic research agency KAERI by exploiting a VPN vulnerability. South Korean...
Experts attribute a series of cyber-espionage campaigns dating back to 2014, and focused on gathering military intelligence, to China-linked Unit...
This strange malware stops you from visiting pirate websites Sophos researchers uncovered a malware campaign that aims at blocking infected users’ from...
The supermarket chain Wegmans US Wegmans discloses a data breach, customers information was exposed on the Internet due to a...
A researcher discovered multiple vulnerabilities in smart switches of Cisco’s Small Business 220 series, including some issues rated as high...
MotivationThere are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major distros....
Joern's Documentation is available here: https://docs.joern.io/home Quick Installationwget https://github.com/ShiftLeftSecurity/joern/releases/latest/download/joern-install.shchmod +x ./joern-install.shsudo ./joern-install.shjoernCompiling (synthetic)/ammonite/predef/interpBridge.scCompiling (synthetic)/ammonite/predef/replBridge.scCompiling (synthetic)/ammonite/predef/DefaultPredef.scCompiling /home/tmp/shiftleft/joern/(console) ██╗ ██████╗ ███████╗██████╗ ███╗...
Carnival Corp. said that the data breach it has suffered in March might have impacted its customers and employees. Carnival...
An outage suffered by CDN, cybersecurity and cloud services provider Akamai was caused by an issue with its Prolexic DDoS...
TA402 APT group (aka Molerats and GazaHackerTeam) is back after two-month of silence and is targeting governments in the Middle East....
Researchers discovered an unprotected database belonging to CVS Health that was exposed online containing over a billion records. This week WebsitePlanet...
Iran-linked Ferocious Kitten APT group used instant messaging apps and VPN software like Telegram and Psiphon to deliver Windows RAT...
This tool implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) - in this blog post...
This is a GUI for Volatility forensics tool written in PyQT5Prerequisites:1- Installed version of Volatility. 2- Install PyQT5. sudo apt-get...
The securWizCase experts found a major breach that affected the popular online retailer Cosmolog Kozmetik. WizCase’s security team, led by...
Russian national Oleg Koshkin was convicted for operating a “crypting” service used to obfuscate the Kelihos bot from antivirus software. Russian national Oleg...
UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV...
How AI is Transforming Data Governance? Consumers are becoming more aware of their rights, making data governance more relevant across...
Poland ‘s government announced that it was targeted by an ‘Unprecedented’ series of cyber attacks, hackers hit against institutions and...